WO2019134565A1 - Procédé et appareil de vérification de terminal basés sur l'internet des objets à bande étroite - Google Patents

Procédé et appareil de vérification de terminal basés sur l'internet des objets à bande étroite Download PDF

Info

Publication number
WO2019134565A1
WO2019134565A1 PCT/CN2018/123833 CN2018123833W WO2019134565A1 WO 2019134565 A1 WO2019134565 A1 WO 2019134565A1 CN 2018123833 W CN2018123833 W CN 2018123833W WO 2019134565 A1 WO2019134565 A1 WO 2019134565A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
terminal
sensor
registration
verification
Prior art date
Application number
PCT/CN2018/123833
Other languages
English (en)
Chinese (zh)
Inventor
田康
Original Assignee
中国移动通信有限公司研究院
中国移动通信集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国移动通信有限公司研究院, 中国移动通信集团有限公司 filed Critical 中国移动通信有限公司研究院
Publication of WO2019134565A1 publication Critical patent/WO2019134565A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Definitions

  • the present disclosure relates to the Internet of Things technology, and in particular, to a terminal verification method and apparatus based on a narrowband Internet of Things.
  • the Internet of Things also known as the sensor network, is an extension of the Internet from person to object, and security issues are undoubtedly a critical and critical link in the use of the Internet of Things.
  • terminals accessing the Internet of Things usually do not have a direct human-computer interaction interface, but need to directly connect with the IoT platform at the back end, and then through the service interface of the Internet of Things platform. Perform related operations and device management, such as registration, upgrade, read and write interfaces.
  • the narrowband IoT terminal Due to the close connection between the narrowband IoT terminal and the IoT platform, in addition to the security of the communication channel, it is very important to verify whether the accessed terminal is legitimate. Because if the correct resolution is not possible, when the illegal narrow-band IoT terminal accesses the Internet of Things platform, it may cause the user to obtain false information, and more serious may cause an abnormality in the entire IoT platform.
  • narrow-band IoT terminals and IoT platforms have their own characteristics:
  • narrow-band IoT terminals are usually devices with very limited computing power (for example, car locks with sensors), and have high requirements for the continuous battery power, so they cannot take on too many complicated operations and need to be verified during the verification process. Reduce the computational load of narrow-band IoT terminals and not consume too much storage space.
  • the Internet of Things platform is faced with a large number of narrow-band IoT terminal access. Too complex security computing and information query and storage will also increase the operation and maintenance costs of the IoT platform.
  • the terminal verification scheme in the related communication system is not applicable to the Internet of Things, and the corresponding terminal verification scheme needs to be redesigned in combination with the technical characteristics of the Internet of Things.
  • a method for terminal verification based on a narrowband Internet of Things comprising:
  • the authentication gateway receives the registration information sent by the terminal, where the registration information carries at least the serial number of the terminal, the signature information, and the sensor information to be activated.
  • the authentication gateway obtains registration reference information pre-stored corresponding to the serial number, and performs verification on the signature information and the sensor information to be activated based on the registration reference information to obtain a verification result;
  • the authentication gateway allows the terminal to access the Internet of Things platform when at least the verification result indicates that the signature information and the to-be activated sensor information are both verified.
  • the method before the authentication gateway receives the registration information sent by the terminal, the method further includes:
  • the authentication gateway performs terminal information synchronization between the local and the Internet of Things platform, saves the serial number of each terminal, and records corresponding registration reference information corresponding to each serial number respectively.
  • the authentication gateway acquires registration reference information that is pre-stored by the serial number, including:
  • the authentication gateway decrypts the registration information by using a key that is pre-agreed or currently negotiated with the terminal, and obtains the serial number of the terminal carried in the registration information.
  • the authentication gateway acquires registration reference information pre-stored corresponding to the serial number based on the serial number.
  • the authentication gateway verifies the signature information based on the registration reference information, including:
  • the authentication gateway obtains a preset public key and reference sensor description information from the registration reference information, where the reference sensor description information records a sensor ID and a maximum instance of each sensor installed on the terminal. Quantity
  • the authentication gateway decrypts the signature information by using the public key, obtains a first part of sensor description information, and acquires a second part of sensor description information corresponding to the serial number pre-stored, and the first part of the sensor description information and The second part of the sensor description information is combined to obtain complete sensor description information;
  • the authentication gateway matches the complete sensor description information and the reference sensor description information, determines that the two are consistent, and determines that the signature information is verified.
  • the authentication gateway verifies the to-be-activated sensor information based on the registration reference information, including:
  • the authentication gateway compares the to-be-activated sensor information with the reference sensor description information recorded in the registration reference information to obtain a comparison result, wherein the reference sensor description information records each installed on the terminal Sensor ID and maximum number of instances of the sensor;
  • the method further includes:
  • the authentication gateway extracts the verification information from the registration request message, where the verification information is information obtained by the terminal in the last registration process for distinguishing the terminal; the authentication gateway uses the verification information. Comparing with the reference verification information stored locally corresponding to the serial number, and determining that the two are consistent, determining that the verification information passes the verification.
  • the authentication gateway allows the terminal to access the Internet of Things platform, the verification information and the reference verification information are updated, and the updated verification information is sent to the terminal for storage.
  • a method for terminal verification based on a narrowband Internet of Things includes:
  • a communication unit configured to receive registration information sent by the terminal, where the registration information carries at least a serial number of the terminal, signature information, and sensor information to be activated;
  • a verification unit configured to obtain registration reference information pre-stored corresponding to the serial number, and verify the signature information and the sensor information to be activated based on the registration reference information, to obtain a verification result
  • a processing unit configured to allow the terminal to access the Internet of Things platform when at least determining that the verification result characterizes the signature information and the to-be activated sensor information are verified.
  • the verification unit before receiving the registration information sent by the terminal, the verification unit is further configured to:
  • the terminal information is synchronized between the local and the Internet of Things platform, the serial number of each terminal is saved, and the corresponding registration reference information is recorded corresponding to each serial number.
  • the verification unit is configured to:
  • the registration information is decrypted by using a key that is pre-agreed or currently negotiated with the terminal, and the serial number of the terminal carried in the registration information is obtained.
  • the verification unit is configured to:
  • the reference sensor description information records a sensor ID and a maximum number of instances of each sensor installed on the terminal;
  • the verification unit is configured to:
  • Determining that the to-be-activated sensor information is verified by determining that the number of implementations to be activated corresponding to each sensor ID recorded in the sensor information to be activated is not greater than the maximum implementation number corresponding to the corresponding sensor ID in the reference sensor information. .
  • the registration information further carries the verification information
  • the verification unit is further used before allowing the terminal to access the Internet of Things platform.
  • Extracting the verification information from the registration request message where the verification information is information obtained by the terminal in the last registration process for distinguishing the terminal; the authentication gateway is configured to correspond to the local The reference verification information stored in the serial number is compared, and when it is determined that the two are consistent, the verification information is determined to pass the verification.
  • processing unit is further configured to:
  • the verification information and the reference verification information are updated, and the updated verification information is sent to the terminal for storage.
  • a storage medium storing a program for implementing terminal verification based on narrowband Internet of Things, wherein when the program is executed by the processor, the following steps are performed:
  • Registration information sent by the terminal where the registration information carries at least a serial number of the terminal, signature information, and sensor information to be activated;
  • a fourth aspect a communication device comprising one or more processors; and one or more computer readable media having stored thereon instructions for being executed by the one or more processors
  • the apparatus is caused to perform the method of any of the above first aspects.
  • FIG. 1 is a schematic diagram of a verification process for a narrowband Internet of Things terminal according to an embodiment of the present disclosure
  • FIG. 2 is a schematic structural diagram of a function of an authentication gateway in an embodiment of the present disclosure.
  • the purpose of the present disclosure is to provide a terminal verification method and apparatus based on a narrowband Internet of Things, which is used to accurately complete terminal verification without increasing the operational load of the terminal and the Internet of Things platform.
  • the definition of the triplet of the narrowband Internet of Things terminal (hereinafter referred to as the terminal) is described below.
  • a typical narrowband IoT terminal its functional definition can be organized according to the following triples: "sensors, sensor instances, sensor parameters", ie objects (eg, a certain type of sensor), object instances (eg, in the terminal above) The number of sensors in a class) and the resources in an object (eg, various attributes in a sensor).
  • the triplet when targeting a terminal product as a thermometer, the triplet can be defined as "8811/1/2000", which means that a sensor object with the number 8811 is currently owned. 1 instance, and the attribute is a resource labeled 2000.
  • the included resource set is certain.
  • the temperature set corresponding to the temperature sensor includes temperature values, upper and lower temperature limits, temperature measurement accuracy, and the like.
  • the Internet of Things platform can manage devices for terminals.
  • the Internet of Things platform can standardize the definition of devices and their related functions and resources, and effectively simplify and standardize the communication content. This method is also the basis for the implementation of the disclosed technical solutions.
  • the Internet of Things platform generates a unique serial number in the platform range for each terminal: sn; at the same time, corresponding signature information is generated for each terminal: sig.
  • sn a unique serial number in the platform range for each terminal
  • sig corresponding signature information is generated for each terminal: sig.
  • the triplet mentioned above is used when generating the signature information, specifically:
  • v ⁇ object 1; object 2; ... object N ⁇ ; where object i (1 ⁇ i ⁇ N) uses the "sensor” in the above triplet and its “maximum number of instances "Two expressions, namely "object_id” and "max_instance_amount”.
  • object i is represented as "8811/2"
  • 8811 is identification information (ie, ID) of the temperature sensor
  • 2 indicates that there are at most two temperature sensors in the terminal.
  • the Internet of Things platform first adopts asymmetrically encrypted key-value pairs: sign_keypair(pk, sk), obtains the public key (pk) and private key (sk) for signature, and then uses sk to information vector.
  • v performs a separate signature: sign_detached(sig,v,sk), and obtains the signature information sig.
  • split signature means that only part of the information in the information vector v is signed, and the signature information sig is generated, and the remaining part information is used for subsequent split signature verification: sign_verify_detached (sig, v, pk).
  • the IoT platform will send the generated sn and sig of each terminal to the terminal manufacturer, and the terminal manufacturer writes the corresponding sn and sig to the security area of the terminal before the terminal leaves the factory.
  • the detailed process for verifying the terminal in the narrowband Internet of Things is as follows:
  • Step 100 Synchronize terminal information between the authentication gateway and the Internet of Things platform.
  • the authentication gateway can be used as a part of the Internet of Things platform, and can also be used as an independent device.
  • the authentication gateway is an independent device as an example, so that the authentication can be performed.
  • Part of the gateway's functions are independent from the IoT platform, simplifying the business logic of the IoT platform and logically isolating it to improve the overall security of the system.
  • the authentication gateway implements terminal information synchronization between the local and the Internet of Things platform.
  • the so-called terminal information includes at least: a serial number (sn), signature information (sig), and a publicity for verification.
  • Step 110 The terminal generates registration information.
  • the terminal may initiate the registration process multiple times during the use, for example, switching from the sleep state to the working state; for example, after rebooting, entering the working state; for example, after switching the cell or temporarily disconnecting the network, Access to the network, and so on.
  • the terminal when the terminal needs to perform network registration, the terminal generates registration information according to its current working state, and the registration information carries at least the sn, sign, and the to-be activated sensor information (ie, v' written by the terminal.
  • the registration information carries at least the sn, sign, and the to-be activated sensor information (ie, v' written by the terminal.
  • the sensor identification information hereinafter referred to as sensor ID
  • the sensor ID the sensor identification information of the sensor currently required to be activated by the Internet of Things platform and the corresponding number of implementations to be activated are recorded in v'.
  • the terminal may further carry the verification information (hereinafter referred to as a token) in the registration information, and the verification information is set to be empty at the initial use, and each time the terminal initiates the registration process, after the verification, the authentication gateway will re-issue the authentication gateway.
  • the updated token is sent to the terminal.
  • the updated token is carried in the registration information and sent to the authentication gateway.
  • the authentication gateway can distinguish whether the terminal is cloned by the consistency of the token. Of course, if the clone terminal is distinguished, the token may not be carried, and details are not described herein.
  • Step 120 The terminal sends a registration request message to the authentication gateway, where the registration request message carries registration information.
  • the terminal may use the symmetric encryption algorithm to confuse the registration information when sending the registration request message.
  • the symmetric encryption algorithm may be used to pre-arrange or negotiate with the authentication gateway or the Internet of Things platform.
  • the IoT platform notifies the authentication gateway during the terminal information synchronization process.
  • Step 130 The authentication gateway verifies the terminal based on the registration information carried in the registration request message. Specifically, after the authentication gateway obtains the registration information, if the terminal performs symmetric encryption processing on the registration information in step 120, the authentication gateway needs to use the agreed key to decrypt the registration information.
  • the authentication gateway obtains sn and sig from the registration information. Further, it is also possible to obtain a token. In the following embodiments, the token is taken as an example for description.
  • the authentication gateway detects the registration reference information pre-stored by the sn through the sn, wherein the registration reference information may be recorded in the form of a packet, such as (pk, v, token), and the registration reference information is a pair with the sn.
  • a key-value relationship can be used for fast retrieval.
  • v indicates the sensor ID of each type of sensor set on the terminal corresponding to the sn and the corresponding maximum number of instances. It can also be referred to as reference sensor description information.
  • the authentication gateway verifies the registration information in the following manner.
  • the authentication gateway uses a separate signature verification function (sign_verify_detached, which uses pk and v in the registration reference information to verify sig.
  • the authentication gateway decrypts the sig by using pk, obtains the first part of the sensor description information, and then obtains the second part of the sensor description information corresponding to the sn sent by the Internet of Things platform, and the first part of the sensor description information and the second part of the sensor
  • the description information is merged to obtain complete sensor description information, and the complete sensor description information obtained by parsing the sig is matched with the reference sensor description information (ie, v) extracted by the local corresponding sn, and when the determination is consistent, the sig is determined. approved.
  • the authentication gateway will learn the complete v and the second part of the sensor description information, and the description will not be repeated here.
  • the authentication gateway matches the v recorded in the registration reference information with the v' carried in the registration information, wherein the v includes at least the sensor ID of each sensor set on the terminal and the corresponding maximum implementation quantity, if v' The number of implementations to be activated for each sensor ID recorded in the medium is not greater than the maximum number of instances corresponding to the corresponding sensor ID in v, and it is determined that the matching of v and v' is successful, that is, v' passes the verification.
  • the authentication gateway needs to perform token pairing. If the token carried in the registration information is consistent with the token stored in the local corresponding sn (also referred to as a reference token), it is determined that the token is successfully matched, that is, the token passes the verification.
  • the token is used to distinguish whether the terminal is a cloned terminal, because the token is updated every time it is registered. Therefore, two terminals using the same token cannot be registered at the same time. Then, once this situation is found, the Internet of Things platform will be The abnormal terminal can be discovered and processed in time.
  • Step 140 The authentication gateway returns a verification result to the terminal, and notifies the terminal to pass the verification.
  • the authentication gateway generates a new token and sends it to the terminal.
  • the terminal needs to save the new token for the next verification.
  • the authentication gateway also saves the new token (that is, the new reference token).
  • the Token update method can be flexibly set according to the specific application environment, for example, according to the set step size, decreasing according to the set step size, generating a random number by using a specified random function, etc., no matter which way, only the terminal side is determined. If the token is the same as the token saved by the authentication gateway, it can be determined that there is no clone terminal, and details are not described herein.
  • the authentication gateway also notifies the terminal that the verification has failed.
  • Step 150 The authentication gateway forwards the registration request message sent by the terminal to the Internet of Things platform, and allows the establishment of an interactive connection with the Internet of Things platform.
  • the authentication gateway includes at least a communication unit 20, a verification unit 21, and a processing unit 22, where
  • the communication unit 20 is configured to receive the registration information sent by the terminal, where the registration information carries at least the serial number of the terminal, the signature information, and the sensor information to be activated.
  • the verification unit 21 is configured to obtain registration reference information pre-stored corresponding to the serial number, and verify the signature information and the sensor information to be activated based on the registration reference information to obtain a verification result;
  • the processing unit 22 is configured to allow the terminal to access the Internet of Things platform when at least determining that the verification result characterizes the signature information and the to-be activated sensor information are verified.
  • the verification unit 21 before receiving the registration information sent by the terminal, the verification unit 21 is further configured to:
  • the terminal information is synchronized between the local and the Internet of Things platform, the serial number of each terminal is saved, and the corresponding registration reference information is recorded corresponding to each serial number.
  • the verification unit is configured to:
  • the registration information is decrypted by using a key that is pre-agreed or currently negotiated with the terminal, and the serial number of the terminal carried in the registration information is obtained.
  • the verification unit 21 is configured to:
  • the reference sensor description information records a sensor ID and a maximum number of instances of each sensor installed on the terminal;
  • the verification unit 21 is configured to:
  • Determining that the to-be-activated sensor information is verified by determining that the number of implementations to be activated corresponding to each sensor ID recorded in the sensor information to be activated is not greater than the maximum implementation number corresponding to the corresponding sensor ID in the reference sensor information. .
  • the verification unit 21 is further configured to:
  • Extracting the verification information from the registration request message where the verification information is information obtained by the terminal in the last registration process for distinguishing the terminal; the authentication gateway is configured to correspond to the local The reference verification information stored in the serial number is compared, and when it is determined that the two are consistent, the verification information is determined to pass the verification.
  • processing unit 22 is further configured to:
  • the verification information and the reference verification information are updated, and the updated verification information is sent to the terminal for storage.
  • a storage medium storing a program for implementing terminal verification based on narrowband Internet of Things is provided, and when the program is executed by the processor, the following steps are performed:
  • Registration information sent by the terminal where the registration information carries at least a serial number of the terminal, signature information, and sensor information to be activated;
  • a communication device including one or more processors; and one or more computer readable media having instructions stored thereon, the instructions When executed by the one or more processors, the apparatus is caused to perform any of the methods mentioned in the above embodiments.
  • an authentication gateway is added between the Internet of Things platform and the terminal, and the verification process of the terminal is completed instead of the Internet of Things platform in the registration process of the terminal, so that the verification process is independent of the underlying link.
  • the mutual authentication between the terminal and the Internet of Things platform is realized, and the related terminal function model is not required to be modified too much to adapt to the characteristics of the narrow-band IoT terminal itself, that is, the terminal does not need to perform excessive operations, and can effectively maintain the power of the terminal.
  • the functional isolation of the verification process is realized, the service reliability of the Internet of Things platform is improved, and the maintenance difficulty of the platform is reduced.
  • the authentication gateway can find various parameters that need to be used in the verification process by using a simple key-value matching method, and does not need to perform complicated information query in a large amount of data, thereby reducing the operation complexity of the verification process.
  • the authentication gateway can use the authentication information token to identify whether the terminal requesting access to the Internet of Things platform is cloned, so that the completely cloned terminal cannot complete the simultaneous registration, and the Internet of Things platform can effectively find and solve related abnormal conditions. Avoid more illegal cloning operations.
  • embodiments of the present disclosure can be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • an authentication gateway is added between the Internet of Things platform and the terminal, and the verification process of the terminal is completed instead of the Internet of Things platform in the registration process of the terminal, so that the verification process is independent of the underlying link.
  • the mutual authentication between the terminal and the Internet of Things platform is realized, and the related terminal function model is not required to be modified too much to adapt to the characteristics of the narrow-band IoT terminal itself, that is, the terminal does not need to perform excessive operations, and can effectively maintain the power of the terminal.
  • the functional isolation of the verification process is realized, the service reliability of the Internet of Things platform is improved, and the maintenance difficulty of the platform is reduced.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention se rapporte à la technologie de l'internet des objets, et concerne un procédé et un appareil de vérification de terminal basés sur l'internet des objets à bande étroite. Le procédé comprend l'étape consistant à ajouter une passerelle d'authentification entre une plateforme de l'internet des objets et un terminal, de façon à ce qu'elle achève un processus de vérification du terminal à la place de la plateforme de l'internet des objets pendant l'enregistrement du terminal.
PCT/CN2018/123833 2018-01-02 2018-12-26 Procédé et appareil de vérification de terminal basés sur l'internet des objets à bande étroite WO2019134565A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810003161.4A CN109995843B (zh) 2018-01-02 2018-01-02 一种基于窄带物联网的终端验证方法及装置
CN201810003161.4 2018-01-02

Publications (1)

Publication Number Publication Date
WO2019134565A1 true WO2019134565A1 (fr) 2019-07-11

Family

ID=67128774

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/123833 WO2019134565A1 (fr) 2018-01-02 2018-12-26 Procédé et appareil de vérification de terminal basés sur l'internet des objets à bande étroite

Country Status (2)

Country Link
CN (1) CN109995843B (fr)
WO (1) WO2019134565A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112600676A (zh) * 2020-12-09 2021-04-02 北京航天紫光科技有限公司 一种用于工业互联网的边缘网关准入方法及装置
CN114697047A (zh) * 2022-06-01 2022-07-01 树根互联股份有限公司 物联网中的子设备注册方法、云服务器及网关设备

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113206815B (zh) 2020-01-31 2024-02-20 伊姆西Ip控股有限责任公司 用于加解密的方法、可编程交换机和计算机可读存储介质
CN111901289B (zh) * 2020-06-03 2022-02-25 瑞数信息技术(上海)有限公司 一种身份认证的方法、装置、设备及存储介质
CN113613190A (zh) * 2021-06-22 2021-11-05 国网思极网安科技(北京)有限公司 终端安全接入单元、系统及方法
CN117596083B (zh) * 2024-01-18 2024-04-12 杭州海康威视数字技术股份有限公司 基于数据脱敏的智能物联网数据聚合方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778102A (zh) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 一种传感器的安全认证方法、传感器及其认证系统
CN102916810A (zh) * 2011-08-05 2013-02-06 中国移动通信集团公司 传感器认证方法、系统和装置
WO2014139342A1 (fr) * 2013-03-15 2014-09-18 福建联迪商用设备有限公司 Procédé de téléchargement de clé, procédé de gestion, procédé de gestion de téléchargement, dispositif et système
CN105635062A (zh) * 2014-10-31 2016-06-01 腾讯科技(上海)有限公司 网络接入设备的验证方法和装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150319170A1 (en) * 2012-12-21 2015-11-05 Didier Grossemy Computer implemented frameworks and methodologies for enabling identification verification in an online environment
CN104505938B (zh) * 2014-12-12 2017-07-14 国家电网公司 一种电网终端通信系统
CN105471858B (zh) * 2015-11-20 2018-08-24 西安电子科技大学 一种基于物联网感知设备的云平台认证系统及方法
CN106683252A (zh) * 2017-03-09 2017-05-17 徐东哲 一种基于窄带物联网的小区智能通行控制系统及方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101778102A (zh) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 一种传感器的安全认证方法、传感器及其认证系统
CN102916810A (zh) * 2011-08-05 2013-02-06 中国移动通信集团公司 传感器认证方法、系统和装置
WO2014139342A1 (fr) * 2013-03-15 2014-09-18 福建联迪商用设备有限公司 Procédé de téléchargement de clé, procédé de gestion, procédé de gestion de téléchargement, dispositif et système
CN105635062A (zh) * 2014-10-31 2016-06-01 腾讯科技(上海)有限公司 网络接入设备的验证方法和装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112600676A (zh) * 2020-12-09 2021-04-02 北京航天紫光科技有限公司 一种用于工业互联网的边缘网关准入方法及装置
CN112600676B (zh) * 2020-12-09 2023-04-07 北京航天紫光科技有限公司 一种用于工业互联网的边缘网关准入方法及装置
CN114697047A (zh) * 2022-06-01 2022-07-01 树根互联股份有限公司 物联网中的子设备注册方法、云服务器及网关设备

Also Published As

Publication number Publication date
CN109995843B (zh) 2021-01-15
CN109995843A (zh) 2019-07-09

Similar Documents

Publication Publication Date Title
WO2019134565A1 (fr) Procédé et appareil de vérification de terminal basés sur l'internet des objets à bande étroite
US10892896B2 (en) Using biometric features for user authentication
CN113438289B (zh) 基于云计算的区块链数据处理方法及装置
US9860718B2 (en) Secure broadcast beacon communications
EP3937046B1 (fr) Méthodes et appareils de démarrage de confiance de station intégrée blockchain
WO2022126980A1 (fr) Procédé et appareil de transmission de données, terminal et support de stockage
US9768951B2 (en) Symmetric keying and chain of trust
US11036870B2 (en) Method and system for secure device based biometric authentication scheme
JP2009087035A (ja) 暗号クライアント装置、暗号パッケージ配信システム、暗号コンテナ配信システム、暗号管理サーバ装置、ソフトウェアモジュール管理装置、ソフトウェアモジュール管理プログラム
US8918844B1 (en) Device presence validation
WO2023142903A1 (fr) Procédé et système de collaboration en périphérie en nuage, appareil, plateforme en nuage, dispositifs et support
CN113347143B (zh) 一种身份验证方法、装置、设备及存储介质
CN114155639A (zh) 基于物联网的门禁控制方法、门禁系统及存储介质
EP3221996B1 (fr) Gestion de clés symétriques et chaîne de confiance
Zhang et al. TEO: Ephemeral ownership for iot devices to provide granular data control
CN109891425B (zh) 序列验证
CN110515700B (zh) 一种虚拟机迁移方法、系统、装置及可读存储介质
WO2020010831A1 (fr) Procédé d'acquisition de données, système d'acquisition de données, terminal et outil de diagnostic
KR101711024B1 (ko) 부정조작방지 장치 접근 방법 및 그 방법을 채용한 단말 장치
US11968305B2 (en) Four-factor authentication
CN110602121B (zh) 一种网络密钥获取方法、装置和计算机可读存储介质
CN108228219B (zh) 一种带外刷新bios时验证bios合法性的方法及装置
WO2016029668A1 (fr) Procédé, dispositif, et système de connexion sécurisée, et support de stockage informatique
CN115001716B (zh) 教育一体机的网络数据处理方法、系统和教育一体机
TWI841331B (zh) 零信任鑑別聲明系統、方法及電腦可讀媒介

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18897946

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16.10.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18897946

Country of ref document: EP

Kind code of ref document: A1